How have you solved the puzzle and utilizing CIAM for this purpose?  Should CIAM focus purely on authenticating/authorization the customers or having more control of contact information, consents and preferences (I'd prefer the latter one)?  

4.2k viewscircle icon1 Upvotecircle icon2 Comments
Sort by:
Software Engineer in Software2 years ago


I believe that CIAM should focus on more than just authenticating and authorizing customers. It should also provide organizations with the ability to manage contact information, consents, and preferences. This is important for a number of reasons:

It allows organizations to build stronger relationships with their customers. By having a better understanding of their customers' contact information, consents, and preferences, organizations can provide more personalized and relevant experiences.
It helps organizations to comply with data privacy regulations. Many data privacy regulations, such as the GDPR and CCPA, require organizations to obtain consent from their customers before collecting and processing their personal data. CIAM can help organizations to manage this consent process effectively.
It gives organizations more control over their data. By managing contact information, consents, and preferences within CIAM, organizations can reduce their reliance on third-party systems and have more control over their data security.

Head of ISG in Finance (non-banking)2 years ago

By expanding CIAM to cover these aspects, you can create a more comprehensive and customer-centric approach to managing customer identities. This not only enhances security and compliance but also contributes to improved customer experiences and relationships. However, it's crucial to strike the right balance between data control and customer convenience, ensuring that customers feel empowered and in control of their data while also meeting regulatory requirements.

Content you might like

Provision privilege user account separate from regular user account, and expect workforce to use privilege account for elevated access70%

Provision standing privilege\elevated access on the regular user account 30%

Use Just-In-Time (JIT) provisioning to elevate privileges on demand for regular user account26%

View Results

Internal cooperation25%

Open-minded board28%

Understanding the business17%

Understanding threat landscape21%

Being on top of the latest technology7%

View Results